From: Chen Qi Date: Wed, 27 Sep 2023 07:14:38 +0000 (-0700) Subject: python3: add cpython to CVE_PRODUCT X-Git-Tag: yocto-5.2~4989 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=62598e1138f21a16d8b1cdd1cfe902aeed854c5c;p=thirdparty%2Fopenembedded%2Fopenembedded-core-contrib.git python3: add cpython to CVE_PRODUCT https://nvd.nist.gov/vuln/detail/CVE-2023-33595 uses 'cpython'. Although it's currently the only one that uses cpython, let's add cpython to CVE_PRODUCT, just in case. Signed-off-by: Chen Qi Signed-off-by: Alexandre Belloni --- diff --git a/meta/recipes-devtools/python/python3_3.11.5.bb b/meta/recipes-devtools/python/python3_3.11.5.bb index 6c624c9d3d5..8e023c7dfb8 100644 --- a/meta/recipes-devtools/python/python3_3.11.5.bb +++ b/meta/recipes-devtools/python/python3_3.11.5.bb @@ -46,7 +46,7 @@ SRC_URI[sha256sum] = "85cd12e9cf1d6d5a45f17f7afe1cebe7ee628d3282281c492e86adf636 UPSTREAM_CHECK_REGEX = "[Pp]ython-(?P\d+(\.\d+)+).tar" UPSTREAM_CHECK_URI = "https://www.python.org/downloads/source/" -CVE_PRODUCT = "python" +CVE_PRODUCT = "python cpython" CVE_STATUS[CVE-2007-4559] = "disputed: Upstream consider this expected behaviour" CVE_STATUS[CVE-2019-18348] = "not-applicable-config: This is not exploitable when glibc has CVE-2016-10739 fixed"